|
|
Message-ID: <20240417143854.66rgilsjticr3cp5@jwilk.net>
Date: Wed, 17 Apr 2024 16:38:54 +0200
From: Jakub Wilk <jwilk@...lk.net>
To: <oss-security@...ts.openwall.com>
Subject: Re: backdoor in upstream xz/liblzma leading to ssh
server compromise
* Andres Freund <andres@...razel.de>, 2024-03-29 08:51:
>d) LANG needs to be set
If timing "sshd -h" is a reliable method of checking if the backdoor is
active, then this is not correct. It seems all you need is non-empty
environment:
# time env -i /usr/sbin/sshd -h 2>/dev/null
real 0m0.009s
user 0m0.004s
sys 0m0.005s
# time env -i X= /usr/sbin/sshd -h 2>/dev/null
real 0m0.345s
user 0m0.337s
sys 0m0.009s
Further evidence that LANG doesn't matter:
* LANG is not on the list of extracted strings[0].
* Some folks[1][2] misspelled LANG as LC_LANG, and apparently it still
worked.
[0] https://gist.github.com/q3k/af3d93b6a1f399de28fe194add452d01
[1] https://gist.github.com/smx-smx/a6112d54777845d389bd7126d6e9f504
[2] https://github.com/binarly-io/binary-risk-intelligence/tree/master/xz-backdoor
>I am *not* a security researcher, nor a reverse engineer.
Congrats, you've just made a lot of people feel inadequate. :P
--
Jakub Wilk
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.